-
Day 52:
#100Daystolearnandimprove 1. Read bug bounty writeup while traveling
to office
https://medium.com/@mohameddaher/how-i-paid-2-for-1054-xss-bug-20-chars-blind-xss-payloads-12d32760897b …
https://medium.com/@0xgaurang/case-study-oauth-misconfiguration-leads-to-account-takeover-d3621fe8308b …
https://medium.com/bugbountywriteup/exploiting-jsonp-and-bypassing-referer-check-2d6e40dfa24 …
2. Manage time to read and practice waptx v2 labs.. currently stuck with office work as well 2 hrs of traveling -
Day 51 End:
#100Daystolearnandimprove 1. Read@eLearnSecurity waptx v2 xss pdf cool stuff.. understood few different concept 2. Interesting bug bounty writeup i read today..
https://blog.usejournal.com/graphql-bug-to-steal-anyones-address-fc34f0374417 …
https://medium.com/@himanshu_pdy/ldap-admin-account-bypassed-2cc8b264d66e …
https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html …
https://medium.com/@dPhoeniixx/vimeo-upload-function-ssrf-7466d8630437 … -
Day 51:
#100Daystolearnandimprove 1. Read waptx pdf and understand the concept maybe even develop some web app to understand developer view too. 2. Read bug bounty writeup.. as they really teach alot good stuff Already at office while traveling read
http://niiconsulting.com/checkmate/2018/05/kerberoasting-exploiting-unpatched-systems-a-day-in-the-life-of-a-red-teamer/ … -
Day 50 End:
#100Daystolearnandimprove 1. Rooted HTB monteverde amazing box. Learned new concept which is going to be useful in red team engagement 2. Amazing WriteUp to Read#Bug#bounty https://medium.com/@rootxharsh_90844/abusing-feature-to-steal-your-tokens-f15f78cebf74 … https://medium.com/@rootxharsh_90844/vimeo-ssrf-with-code-execution-potential-68c774ba7c1e … http://whitehathaji.blogspot.com/2019/07/paypal-bug-10k-all-secondary-users.html …pic.twitter.com/EkjQhFXSlG
-
Day 49 End:
#100Daystolearnandimprove Write-up I read today Race Condition https://hackerone.com/reports/759247 https://hackerone.com/reports/300305 file Read https://hackerone.com/reports/303744 https://hackerone.com/reports/500515 Stored XSS https://hackerone.com/reports/662287 SOP bypass using browser cachehttps://hackerone.com/reports/761726 -
Day 49
#100Daystolearnandimprove 1. Read pdf of WAPTX v2. Create note and understand it.. go slowly but understand properly 2. If get bored of
go back to c# coding
3. If again get tired of 
read some blogs -
Day 48 End:
#100Daystolearnandimprove Learned different encoding techniques and different way to bypass waf using encoding.. Thanks ti@eLearnSecurity for Waptx v2 ... -
Day 48
#100Daystolearnandimprove Past few days i was focusing on multiple stuff which caused me alot of problem and not able to complete anything properly. Will only focused on the course which had purchased for now WAPTX v2.. and try to finish it. -
Day 47 End
#100Daystolearnandimprove Interesting SQL Injections writeup to learn interesting Concept : https://medium.com/@notsoshant/a-not-so-blind-rce-with-sql-injection-13838026331e … https://medium.com/@terjanq/blind-sql-injection-without-an-in-1e14ba1d4952 … https://medium.com/swlh/diving-into-unserialize-more-than-rce-d48d371db7da … https://blog.usejournal.com/time-based-blind-sql-injection-in-graphql-39a25a1dfb3c … https://blog.netspi.com/decrypting-iis-passwords-to-break-out-of-the-dmz-part-2/ …#hacking#Coding@chiragsavla94@trouble1_raunak -
Day 47
#100Daystolearnandimprove Planning to read only blog today as i am loaded with office work.#hacking#Coding#Day 9: 30 minutes workout -
Day 46 End:
#100Daystolearnandimprove At last rooted nest machine.. interesting machine learned alot..#hacking#Coding#Day 8 End: Did 30 minutes workout -
Day 45 End:
#100Daystolearnandimprove Read red team blog will try to recreate at home labs for demos..#linux#lateralmove#evasion#azure
https://www.onsecurity.co.uk/blog/abusing-kerberos-from-linux …
https://posts.specterops.io/attacking-azure-azure-ad-and-introducing-powerzure-ca70b330511a …
http://blog.redxorblue.com/2019/12/no-shells-required-using-impacket-to.html …
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/scshell-fileless-lateral-movement-using-service-manager …
https://www.matteomalvica.com/blog/2019/12/02/win-defender-atp-cred-bypass …
#redteam -
Day 45::
#100Daystolearnandimprove 1. Read red team blog 2. Try to understand the malware use by apt and learn to code it 3. Possibly try to root htb boxes nest and monteverde 4. Manage tym#hacking#Coding#Day 7: 30 to 60 minutes workout Try to eat healthy food -
Day 44 End:
#100Daystolearnandimprove Htb boxes have user on nest and monteverde trying to root.. let see tomorrow#hacking#Coding#Day 6 End: Did shoulder and arm for 50 minutes.. But not sure about healthy food. Any idea regarding vegan diet. -
Day 44:
#100Daystolearnandimprove 1. Htb root nest machine 2. Read c# and code 3. Read bug bounty writeup or some red team related blogs 4. Make note and share those stuff#hacking#Coding#Day 6: Do workout for 30 minutes Eat healthy stuff -
Day 43 End:
#100Daystolearnandimprove Got user on nest machine amazing stuff especially enumeration play a key role.. tomorrow let try to get root. Got too many c# book but still not able to code and understand concept#hacking#Coding#Day 5 End: Did workout for 30 minutes. -
Day 43:
#100Daystolearnandimprove Planning to get red team labs from https://www.zeropointsecurity.co.uk/courses/red-team-ops-1 … 1. Read c#8 book 2. Watch .net core video from youtube 3. Build web app#hacking#Coding#Day 5: Do workout for 30 to 60 minutes.
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.